|Title:||ISO/IEC 27001:2005 - Information technology -- Security techniques -- Information security management systems -- Requirements|
(Note: this is a reference to the ISO page where the standard can be acquired. However, the standard is not free of charge, and its provisions are not publicly available. For this reason, specific provisions cannot be quoted).
|Topic:||Standard containing generally accepted guidelines for the implementation of an Information Security Management System within any given organisation.|
|Direct / indirect relevance||Direct. While not legally binding, the text contains direct guidelines for the creation of sound information security practices.|
|Scope:||Not publicly available ISO standard, which can be voluntarily implemented.|
|Legal force:||Nonbinding ISO standard.|
|Affected sectors:||Generic. The standard can be implemented in any sector confronted by information security management.|
|Relevant provision(s):||The standard is not free of charge, and its provisions are not publicly available. For this reason, specific provisions cannot be quoted.
Generally, the contents of the abstract are described as follows:
‘ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.
ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.
ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following:
• use within organizations to formulate security requirements and objectives;
• use within organizations as a way to ensure that security risks are cost effectively managed;
• use within organizations to ensure compliance with laws and regulations;
• use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
• definition of new information security management processes;
• identification and clarification of existing information security management processes;
• use by the management of organizations to determine the status of information security management activities;
• use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
• use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
• implementation of business-enabling information security;
• use by organizations to provide relevant information about information security to customers.’
|Relevance to RM/RA:||The standard is a very commonly used code of practice, and serves as a resource for the implementation of information security management systems and as a yardstick for auditing such systems and/or the surrounding practices. (See also
Its application in practice is often combined with related standards, such as BS 7799-3:2006 which provides additional guidance to support the requirements given in ISO/IEC 27001:2005